Join India's No. 1 Course
CEH v11
Certified Ethical Hacking Program
- 40+ hours of Instructor-Led Training
- EC-Council Authorized Training Partner
- EC-Council Official Courseware
- CEI Certified Trainers
- Recorded Video Session
- Free ilabs 6 months subscription
- 24x7 support
Get A Free Demo Class!
Your information and data is 100% secure and private

1-TO-1 TRAINING
Customized schedule Learn at your dedicated hour Instant clarification of doubt Guaranteed to run

Instructor Led live Training
Flexibility, Convenience & Time Saving
More Effective
Learning Cost Savings

Self paced Learning
Customized schedule Learn at your dedicated hour Instant clarification of doubt Guaranteed to run
CEH Course Content / Exam(s)
With drastic increase in devices connected to exchange the information and businesses shifting to the digitation at never-before fast pace, the devices, systems and networks’ security remains at stake and highly prone to information and data threats and hacking incidents. Companies strive to hire security professionals having utmost understanding of building and maintaining hack-proof organizational infrastructures, thereby creating skyrocketing demand of certified Ethical Hackers.
EC-council’s CEH V11 certification training focuses to train aspiring security professionals to gain essential ethical hacking skills with practical implementation of scanning, testing, hacking and securing the systems. The CEH V11 training and certification from InfoSec Train features:
- • Inducing “think like hacker” approach in the participants
- • Explains the functioning of the perimeter defenses, scan and hacking networks without affecting the real networks to identify vulnerabilities
- • Demonstrates the exploitation of privileges by intruders and fool-proof security measures to protect the security architecture of the organization
- • Real-like test environments to help participants explore their acquired skills
- • Interactive theory and lab sessions delivered by the industry experts having several years of experience
Successful completion the CEH V11 certification training empowers you with across the board understanding of:
- Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
- Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
- Performing network scans, host and port discovery by utilizing different scanning tools
- Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
- Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
- Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
- Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
- Packet sniffing concepts, techniques, and protection against the same.
- Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defence tools
- Security solutions like firewall, IPS, honeypots, their evasion, and protection
- Web server and web application-based attacks, methodologies
- SQL injection, hijacking, and evasion techniques
- Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
- Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
- Operational Technology (OT) essentials, threats, attack methodologies and attack prevention. The concept of OT is a new addition.
- Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
- Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
- Cloud computing, threats and security, essentials of container technology and serverless computing
- Module 01 : Introduction to Ethical Hacking – This module introduces you to the basic concepts of hacking, what is hacking, who are hackers, their intent, and other related terminologies.
- Module 02 : Footprinting and Reconnaissance – Gathering information from various sources using footprinting tools and how to defend against the same
- Module 03 : Scanning Networks – Different techniques to identify and scan the network, host, and port discovery by utilizing various scanning tools.
- Module 04 : Enumeration- Finding detailed information about the hosts and ports discovered during scanning. This module now includes sub-domains like NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking, along with the countermeasures.
- Module 05 : Vulnerability Analysis – It introduces the concepts of vulnerability assessment, its types, along with a hands-on experience of tools that are currently used in the industry.
- Module 06 : System Hacking – It focuses on the “how” part. How to gain access of the system, how to escalate privileges, how to maintain access, and how to clear your tracks.
- Module 07 : Malware Threats – Malware threat terminologies, viruses, worms, trojans, their analysis, and countermeasures to prevent data loss. The introduction and analysis of malware like, Emotet and fileless that are gaining popularity have been updated under this section. APT concepts have also been added.
- Module 08 : Sniffing – Packet sniffing techniques, associated tools, and related defensive techniques
- Module 09 : Social Engineering – Since humans are the most significant vulnerability for any organization, it becomes essential to understand how attackers use them for their purpose for carrying out attacks like identity theft, impersonation, insider threat, and how to defend against such social engineering attacks.
- Module 10 : Denial-of-Service – As DoS and DDoS are some of the most common purposes of attackers, this module talks about these attacks, use cases, and the related attack and defense tools.
- Module 11 : Session Hijacking – To provide a deeper understanding of the technique, its purpose, tools used along with the countermeasures.
- Module 12 : Evading IDS, Firewalls, and Honeypots – Understand the terminologies and working of these inline defenses and techniques to learn how to evade these while performing an attack.
- Module 13 : Hacking Web Servers – Web servers based attacks, methodologies, tools used, and defense
- Module 14 : Hacking Web Applications – Web application-based attacks, techniques, and mitigation.
- Module 15: SQL Injection – An in-depth understanding of the top OWASP top 10 web app vulnerability, it’s working and the mitigation.
- Module 16 : Hacking Wireless Networks – Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
- Module 17 : Hacking Mobile Platforms – Management of mobile devices, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
- Module 18 : IoT and OT Hacking – Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices. Operational Technology (OT) essentials, introduction to ICS, SCADA, and PLC, threats, attack methodologies, and attack prevention. The concept of OT is a new addition.
- Module 19 : Cloud Computing – Cloud computing, threats, and security. Additionally, the essentials of container technology and serverless computing have been added.
- Module 20 : Cryptography – Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis.
Information Security Analyst / Administrator
Information Assurance (IA) Security Officer
Information Security Manager / Specialist
Information Systems Security Engineer / Manager
Information Security Professionals / Officers
Information Security / IT Auditors
Risk / Threat / Vulnerability Analyst
System Administrators
Network Administrators and Engineers
Basic understanding of network essentials, core concepts including server and network components
Certification Name: 312-50 (ECC EXAM), 312-50 (VUE)
Test Format: Multiple Choice
Number of Questions: 125
Test Duration: 4 Hours
What’s New in CEH v11
Enumeration
• NFS Enumeration
• NFS Enumeration Tools
• DNS Cache Snooping
• DNSSEC Zone Walking
Malware Threats
• APT Concepts
• Fireless Malware Concepts
• Trojan Analysis: Emotet
Cloud Computing
• Kubernetes Vulnerabilities & Solutions
• Serverless Application Security Solutions
IoT Hacking
• IoT Device Management
• OT Concepts
• OT Attacks
• OT Hacking Methodology
• OT Countermeasures
Highlights of some of what sets CEH v11 apart from the rest

Mapped to
NICE 2.0

Better
Interface

Emerging Attack
Vectors

Modern Exploit
Technologies

Hands-on Hacking
Chellengges

Enhanced Focus on
Malware Analysis

Live, Cyber Range
(no simulations)

Greater Focus
on Cloud and IoT

Thousands of Hacking
Techniques and Tools

Modern Case Studies
and Current Events
Our Course Advisors
Am Pachouri
(CEH,CEI,A+,N+,MCSE,RHCSA,PDWSE)
A great Cyber Security Expert and Ethical Hacker. He has trained more than ten thousand students in the field of Ethical Hacking. Having experience of more than 10+ years. Delivered more than 100+ live workshops and Good hands-on experience in Vulnerability Assessment, Penetration Testing. Skilled in Various Programming Languages.
Chirag Singla
(CEH,MTA,NSE2,Cisco)
Certified Ethical Hacker, a trainer, and a security researcher. Skilled in Penetration Testing. Delivered more than 50+ sessions on Ethical Hacking and Penetration Testing.